This article is a follow-up of the excellent blog post written last year by Pascal Junod. This explains the strange title. The former post was
Category: Crypto
Audit of drand Timelock Encryption
The Drand team at Protocol Labs recently released a timelock encryption based on the Drand threshold network run by the League of entropy. This timelock encryption construction ensures a ciphertext will be decryptable only after some specified time has
passed and not before. The cryptographic construction of the timelock encryption was recently presented in depth during the Real World Cryptography conference.
Multiple CVEs in threshold cryptography implementations
Introduction io.finnet hired us to perform a code audit of their threshold ECDSA signature implementation called tss-lib based on the paper UC Non-Interactive, Proactive, Threshold
Mitigating Risk in the Allbridge Core
A blockchain bridge enables interoperability between two different blockchains. Typically, it allows one to transfer data and tokens from one chain to another. More accurately,
Introducing Shufflecake: plausible deniability for multiple hidden filesystems on Linux
Today we are excited to release Shufflecake, a tool aimed at helping people whose freedom of expression is threatened by repressive authorities or dangerous criminal
NIST Announces First Quantum-Resistant Cryptographic Standards, PQC End of 3rd Evaluation Round
After a long process started in 2016, today NIST announced the first standardized cryptographic algorithms designed to protect IT systems against future quantum attacks. Here